Advances in cryptology - AUSCRYPT '92. Workshop on the theory and application of cryptographic techniques, Gold Coast, Queensland, Australia, December 13-16, 1992. Proceedings (Q689838)
From MaRDI portal
| This is the item page for this Wikibase entity, intended for internal use and editing purposes. Please use this page instead for the normal view: Advances in cryptology - AUSCRYPT '92. Workshop on the theory and application of cryptographic techniques, Gold Coast, Queensland, Australia, December 13-16, 1992. Proceedings |
scientific article; zbMATH DE number 446617
| Language | Label | Description | Also known as |
|---|---|---|---|
| English | Advances in cryptology - AUSCRYPT '92. Workshop on the theory and application of cryptographic techniques, Gold Coast, Queensland, Australia, December 13-16, 1992. Proceedings |
scientific article; zbMATH DE number 446617 |
Statements
Advances in cryptology - AUSCRYPT '92. Workshop on the theory and application of cryptographic techniques, Gold Coast, Queensland, Australia, December 13-16, 1992. Proceedings (English)
0 references
11 November 1993
0 references
The articles of this volume will be reviewed individually. Indexed articles: \textit{Desmedt, Yvo}, Threshold cryptosystems, 3-14 [Zbl 0867.94016] \textit{Tombak, L.; Safavi-Naini, R.}, Authentication codes with perfect protection, 15-26 [Zbl 0867.94019] \textit{Desmedt, Yvo; Seberry, Jennifer}, Practical proven secure authentication with arbitration, 27-32 [Zbl 0867.94017] \textit{Safavi-Naini, R.; Tombak, L.}, Authentication codes under impersonation attack, 35-47 [Zbl 0869.94024] \textit{Jackson, Wen-Ai; Martin, Keith M.}, Cumulative arrays and geometric secret sharing schemes, 48-55 [Zbl 0869.94018] \textit{Ogata, Wakaha; Kurosawa, Kaoru; Tsujii, Shigeo}, Nonperfect secret sharing schemes, 56-66 [Zbl 0869.94021] \textit{Bertilsson, Michael; Ingemarsson, Ingemar}, A construction of practical secret sharing schemes using linear block codes, 67-79 [Zbl 0869.94012] \textit{Zheng, Yuliang; Pieprzyk, Josef; Seberry, Jennifer}, HAVAL -- a one-way hashing algorithm with variable length of output. (Extended abstract), 83-104 [Zbl 0869.94028] \textit{Preneel, Bart; Govaerts, René; Vandewalle, Joos}, On the power of memory in the design of collision resistant hash functions, 105-121 [Zbl 0869.94023] \textit{Hardjono, Thomas; Zheng, Yuliang}, A practical digital multisignature scheme based on discrete logarithms. (Extended abstract), 122-132 [Zbl 0877.94033] \textit{Harn, Lein; Yang, Shoubao}, Group-oriented undeniable signature schemes without the assistance of a mutually trusted party, 133-142 [Zbl 0869.94016] \textit{Seberry, Jennifer; Zhang, Xian-Mo}, Highly nonlinear 0-1 balanced Boolean functions satisfying strict avalanche criterion. (Extended abstract), 145-155 [Zbl 0868.94039] \textit{Charnes, Chris; Pieprzyk, Josef}, Linear nonequivalence versus nonlinearity, 156-164 [Zbl 0869.94014] \textit{Detombe, John; Tavares, Stafford}, Constructing large cryptographically strong \(S\)-boxes, 165-181 [Zbl 0867.94018] \textit{Korzhik, Valery; Yakovlev, Victor}, Nonasymptotic estimates of information protection efficiency for the wire-tap channel concept, 185-195 [Zbl 0869.94019] \textit{Ramkilde Knudsen, Lars}, Cryptanalysis of LOKI 91, 196-208 [Zbl 0868.94037] \textit{Dawson, Ed}, Cryptanalysis of summation generator, 209-215 [Zbl 0867.94015] \textit{Laih, Chi-Sung; Yen, Sung-Ming}, Secure addition sequence and its applications on the server-aided secret computation protocols, 219-230 [Zbl 1096.68614] \textit{Sakurai, Kouichi; Itoh, Toshiya}, Subliminal channels for signature transfer and their application to signature distribution schemes, 231-243 [Zbl 1096.68616] \textit{Fujioka, Atsushi; Okamoto, Tatsuaki; Ohta, Kazuo}, A practical secret voting scheme for large scale elections, 244-251 [Zbl 1096.68612] \textit{Satoh, Takashi; Kurosawa, Kaoru; Tsujii, Shigeo}, Privacy for multi-party protocols, 252-260 [Zbl 0877.68042] \textit{Pailles, Jean Claude}, New protocols for electronic money, 263-274 [Zbl 1096.68615] \textit{Nieh, Benjamin B.; Tavares, Stafford E.}, Modelling and analyzing cryptographic protocols using Petri nets, 275-295 [Zbl 0877.68043] \textit{Matsumoto, Tsutomu; Imai, Hideki; Laih, Chi-Sung; Yen, Sung-Ming}, On verifiable implicit asking protocols for RSA computation, 296-307 [Zbl 0877.68044] \textit{Lim, Chae Hoon; Lee, Pil Joong}, Modified Maurer-Yacobi's scheme and its applications, 308-323 [Zbl 0867.94021] \textit{Klapper, Andrew}, The vulnerability of geometric sequences based on fields of odd characteristic. (Extended abstract), 327-338 [Zbl 0867.94013] \textit{Lai, Xuejia; Rueppel, Rainer A.; Woollven, Jack}, A fast cryptographic checksum algorithm based on stream ciphers, 339-348 [Zbl 0867.94014] \textit{Mihaljevic, Miodrag J.}, An approach to the initial state reconstruction of a clock-controlled shift register based on a novel distance measure, 349-356 [Zbl 0877.94024] \textit{Yang, Junhui; Dai, Zongduo}, Construction of \(m\)-ary de Bruijn sequences. (Extended abstract), 357-363 [Zbl 0868.94021] \textit{Snare, John}, Information technology security standards -- an Australian perspective, 367-384 [Zbl 1096.68617] \textit{Cerecedo, Manuel; Matsumoto, Tsutomu; Imai, Hideki}, Non-interactive generation of shared pseudorandom sequences, 385-396 [Zbl 0869.94013] \textit{Portz, Michael}, A generalized description of DES-based and Benes-based permutation generators, 397-409 [Zbl 0869.94022] \textit{Condie, Leisa}, Prime generation with the Demytko-Miller-Trbovich algorithm, 413-421 [Zbl 0870.11079] \textit{Hiltgen, Alain P.}, Constructions of feebly-one-way families of permutations, 422-434 [Zbl 0869.94017] \textit{Sakurai, Kouichi; Itoh, Toshiya}, On bit correlations among preimages of ``many to one'' one-way functions. A new approach to study on randomness and hardness of one-way functions, 435-446 [Zbl 0869.94025] \textit{Yen, Sung-Ming; Laih, Chi-Sung}, The fast cascade exponentiation algorithm and its applications on cryptography, 447-456 [Zbl 0869.94027] \textit{Chang, Chin-Chen; Wu, Tzong-Chen; Chen, C. P.}, The design of a conference key distribution system, 459-466 [Zbl 0867.94025] \textit{Zuk, Edward}, Remarks on ``The design of a conference key distribution system'', 467-468 [Zbl 0867.94026] \textit{Harn, Lein; Yang, Shoubao}, Public-key cryptosystem based on the discrete logarithm problem, 469-476 [Zbl 0867.94020] \textit{Miyaji, Atsuko}, Elliptic curves over \(\mathbb{F}_ p\) suitable for cryptosystems, 479-491 [Zbl 0869.94020] \textit{Waldvogel, Christian P.; Massey, James L.}, The probability distribution of the Diffie-Hellman key, 492-504 [Zbl 0867.94023] \textit{Sauerbrey, Jörg}, A modular exponentiation unit based on systolic arrays, 505-516 [Zbl 0869.94026] \textit{O'Keefe, Christine M.}, A comparison of key distribution patterns constructed from circle geometries, 517-527 [Zbl 0867.94027] \textit{Rezny, Mike; Trimarchi, Eddie}, A block cipher method using combinations of different methods under the control of the user key, 531-534 [Zbl 0867.94024] \textit{Preneel, Bart; Govaerts, René; Vandewalle, Joos}, An attack on two hash functions by Zheng-Matsumoto-Imai, 535-538 [Zbl 0867.94022] \textit{Lidl, Rudolf; Müller, Winfried B.}, Primality testing with Lucas functions, 539-542 [Zbl 0871.11093]
0 references
Gold Coast, Queensland (Australia)
0 references
Proceedings
0 references
Workshop
0 references
AUSCRYPT '92
0 references
Cryptographic techniques
0 references
Cryptology
0 references